A Dutch citizen arrested in Spain on suspicion of launching what is described as the biggest cyberattack in internet history operated from a bunker and had a van capable of hacking into networks anywhere in the country, officials say. The ...
Tags: Cyberattack, Computer Products
Researchers following a cyber espionage campaign apparently bent on stealing drone-related technology secrets have found additional malware related to the targeted attacks. FireEye researchers have been tracking so-called "Operation ...
Tags: Malware, Cyber Attacks, Computer Products
While the majority of data breaches are the result of financially motivated cybercriminal attacks, cyberespionage activities are also responsible for a significant number of data theft incidents, according to a report that will be released ...
Tags: Computer Products, software
Cody Andrew Kretsinger, a 25-year-old man from Decatur, Ill., was sentenced Thursday to one year in federal prison for his role in a May 2011 breach of a Sony Pictures website and database. At the time of the intrusion Kretsinger, who ...
Tags: Computer Products, software
Hacker group Anonymous on Saturday made the Formula One its latest victim when it performed a DDoS (distributed denial of service) attack on its official website (formula1.com), as well as defacing its fan site f1-racers.net and several ...
Tags: Computer Products, software
Thirteen popular home and small office routers contain security problems that could allow a hacker to snoop or modify network traffic, according to new research. Independent Security Evaluators (ISE), a security consultancy based in ...
Access to several of Google's most popular web services, including Gmail, Drive and the main administrative console, was disrupted for around two hours Wednesday afternoon. The first to go down, according to Google's?Apps Status ...
Tags: Google Services, Computer Products
System administrators and IT security pros can take bit of a breather: Microsoft issued a comparatively light set of patches for this edition of its monthly release of software vulnerability fixes. "It's a boring Patch Tuesday this month, ...
Tags: Microsoft, Computer Products
Facebook Home, the new app that replaces the home screen on an Android smartphone, should be banned from corporate networks to avoid unnecessary security risks, experts say. Facebook introduced Home on Thursday, aiming to give its 1 ...
The government's vision to have every home in the UK equipped with smart energy meters is getting closer. Next year comes the mass rollout stage but in the meantime, three remaining bidders are battling it out for the right to provide the ...
Tags: Smart Meters, Electrical, Electronics, Meters
The former chief scientist at a Kentucky defense contractor has been sentenced to a year in prison for buying pirated software from Russian and Chinese hackers and using it to design components for military helicopters. Wronald Best, 55, ...
Tags: pirated software, software, computer code
Andrew Auernheimer, a hacker who was convicted last November of illegally accessing emails and other data belonging to 120,000 iPad 3G owners from AT&T's networks is seeking leniency in his sentencing from the court. In a memo filed ...
The Home Office has announced a plan to bring together the skills of the police, industry experts and academics in a Cyber Crime Reduction Partnership (CCRP) to help to stamp out cyber-crime. Security minister James Brokenshire announced ...
Hackers can influence real-time traffic-flow-analysis systems to make people drive into traffic jams or to keep roads clear in areas where a lot of people use Google or Waze navigation systems, a German researcher demonstrated at BlackHat ...
Tags: Hackers, software, Computer Products, system, google map
A former Tribune Company employee could face as much as 25 years of jail time over federal charges accusing him of conspiring with members of the hacker group Anonymous to hack into a Tribune website. Matthew Keys, who according to his ...
Tags: Tribune, Anonymous Hack, company news